The cipher SHARK
From MaRDI portal
Publication:4593788
DOI10.1007/3-540-60865-6_47zbMath1373.94929OpenAlexW2120464016MaRDI QIDQ4593788
Antoon Bosselaers, Joan Daemen, Vincent Rijmen, Erik de Win, Bart Preneel
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_47
Related Items
Linear cryptanalysis of FF3-1 and FEA ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ FASTA -- a stream cipher for fast FHE evaluation ⋮ Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function ⋮ Related-Key Attacks Against Full Hummingbird-2 ⋮ Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Twin column parity mixers and Gaston. A new mixing layer and permutation ⋮ On unbalanced feistel networks with contracting MDS diffusion ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Almost involutory recursive MDS diffusion layers ⋮ The interpolation attack on block ciphers ⋮ TWOPRIME: A fast stream ciphering algorithm ⋮ The block cipher Square ⋮ Generation algorithm of a sort of P-permutations ⋮ Multi-objective optimisation of bijective S-boxes ⋮ On some probabilistic approximations for AES-like S-boxes ⋮ Рассеивающие свойства XSLP-шифров ⋮ Анализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схем ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ SHARK ⋮ New criteria for linear maps in AES-like ciphers ⋮ 3D: A Three-Dimensional Block Cipher ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
Uses Software